Publications
Foundations for cyber zone defense
2016 25th International Conference on Computer Communications and Networks, ICCCN 2016
Cyber Zone Defense: Cooking Security into Network Architecture
Cyber Zone Defense Rendering Malware Inert
Isolation Zones: Attacking Malware Attack Vectors
Cyber Zone Defense -External Browsing Zone
LogJAMM: Logs are Just Another Monitoring Mechanism
Two-factor authentication using OpenSSH
Proposed for publication in the Linux Journal.
8 Results